Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

E-TGPS: Enhanced Terrorist Group Prediction System for Counter Terrorism

by Abhishek Sachan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 24
Year of Publication: 2015
Authors: Abhishek Sachan
10.5120/20704-3633

Abhishek Sachan . E-TGPS: Enhanced Terrorist Group Prediction System for Counter Terrorism. International Journal of Computer Applications. 117, 24 ( May 2015), 24-28. DOI=10.5120/20704-3633

@article{ 10.5120/20704-3633,
author = { Abhishek Sachan },
title = { E-TGPS: Enhanced Terrorist Group Prediction System for Counter Terrorism },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 24 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 24-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number24/20704-3633/ },
doi = { 10.5120/20704-3633 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:00:18.525077+05:30
%A Abhishek Sachan
%T E-TGPS: Enhanced Terrorist Group Prediction System for Counter Terrorism
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 24
%P 24-28
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Terrorist group prediction using historical data of terrorist incidents has been less explored due to the lack of meticulous terrorist data which contains terrorist group's attacks and activities information. There are many reasons for less exploration like its confidentiality & sensitivity. This paper presents an enhanced system that helps to predict the terrorist groups involved in the attack under investigation named E-TGPS. This system initially learns similarities of terrorist activities from various past terrorist incidents to predict the responsible group. This system can be considered as a vital tool for security agencies and intelligence analysts, by providing more reliable and predictive solutions to take effective counter-terrorism measures. The system has been validated by experimental results. The overall performance of the system displays a fair degree of accuracy. This paper also lays emphases on the meticulous analysis of optimal parameters weight estimation, to improve the predictive accuracy of the system.

References
  1. Abhishek Sachan, Devshri Roy, Arun P. V. , "An Analysis of Privacy Preservation Techniques in Data Mining", In: Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, vol. 3, pp. 119-128, Springer Berlin Heidelberg, 2013.
  2. A. Malathi and Dr. S. Santhosh Baboo, "Evolving Data Mining Algorithms on the Prevailing Crime Trend – An Intelligent Crime Prediction Model", In International Journal of Scientific & Engineering Research, June 2011, Vol. 2, Issue 6.
  3. David, G. , "Globalization and International Security: Have the Rules of the Game Changed?", In Annual meeting of the International Studies Association, California, USA, http://www. allacademic. com/meta/p98627_index. html, 2006.
  4. H. Chen, D. Denning et al. , "The Dark Web Forum Portal: From multi-lingual to video", InIntelligence and Security Informatics (ISI), IEEE conference, 2011.
  5. Nooy, W. d. , Mrvar, A. , et al. : Exploratory Social Network Analysis with Pajek. Cambridge University Press, New York, 2005.
  6. Scott, J. : Social Network Analysis. SAGE Publications, London, 2005.
  7. Wasserman, S. , Faust, K. : Social Network Analysis: Methods and Applications, 1994, pp. 266.
  8. Coffman, T. R. , Marcus, S. E. : Pattern Classification in Social Network Analysis: A case study. In: 2004 IEEE Aerospace Conference, March 6-13, 2004.
  9. Abhishek Sachan, "Countering Terrorism through Dark Web Analysis", In: Proceedings of Third International Conference on Computing Communication and Networking Technologies (ICCCNT-12), Coimbatore an IEEE conference, 2012.
  10. Faith Ozgul, Zeki Erdem and Chris Bowerman, "Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms", In: LNCS, vol. 5477, pp. 25-30. Springer, Heidelberg, 2009.
  11. Taipale KA, "Data mining and domestic security: connecting the dots to make sense of data", In Columbia Sci Tech Law Rev 5, 2003, pp. 1–83.
  12. Global Terrorism Database, http://www. start. umd. edu/gtd/, Retreived on 05/02/2012.
  13. South asia terrorism portal , http://www. satp. org/satporgtp/countries/india/terroristoutfits/CPI_M. htm, Retreived on 05/02/2012.
  14. Dark web portal, "http://cri-portal. dyndns. org/portal/Home. action", Retrieved on 19/02/2012.
  15. Abhishek sachan, Devshri roy, "TGPM: Terrorist Group Prediction Model for Counter Terrorism," In: International Journal of Computer Applications, Vol 44 (10), 2012, pp. 49-52.
  16. Ozgul F. , Bondy J. , Aksoy H. , "Mining for offender group detection and story of a police operation", In: Sixth Australasian Data Mining Conference (AusDM 2007). Australian Computer Society Conferences in Research and Practice in Information Technology (CRPIT), Gold Coast, Australia , 2007.
  17. Ozgul F. , Erdem Z. , Aksoy H. , "Comparing Two Models for Terrorist Group Detection: GDM or OGDM?", In: ISI Workshops 2008. LNCS, vol. 5075, pp. 149–160. Springer, Heidelberg, 2008.
  18. Council on Foreign Relations, http://www. cfr. org/india/terror-groups-india/p12773, Retreived on 05/02/2012.
Index Terms

Computer Science
Information Sciences

Keywords

Terrorist groups pattern matching prediction terrorism counter-terrorism group detection privacy security.